Data breach

Results: 1224



#Item
541Security / Ethics / Identity theft / Theft / Credit cards / Credit card fraud / Credit card / Data breach / Identity fraud / Crimes / Identity / Fraud

Vertical Overiew_CU | CID007-v1 FOR CREDIT UNIONS GET THE FACTS KNOW THE RISKS

Add to Reading List

Source URL: www.coreidservices.com

Language: English - Date: 2014-01-27 19:18:58
542Data breach / Cyberwarfare / Structure / National Telecommunications and Information Administration / Security / Innovation

data-driven innovation BUsiness Horizon Quarterly A DOZEN

Add to Reading List

Source URL: www.uschamberfoundation.org

Language: English - Date: 2014-12-19 11:30:07
543Negligent infliction of emotional distress / Duty of care / Causation / Class action / Doe v. MySpace / Wrongful birth / Law / Tort law / Negligence

In re: Target Corporation Customer Data Security Breach Litigation, 14-MDL-2522, PAM/JJK

Add to Reading List

Source URL: cdn.arstechnica.net

Language: English - Date: 2014-12-04 19:53:34
544Computer security / National security / Human rights / Security breach notification laws / Internet privacy / Information privacy / Personally identifiable information / Vulnerability / Security / Ethics / Privacy

Breach Disclosure Laws Contribution to Data Protection and Security

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2013-04-19 03:17:15
545Privacy / Computer law / Data privacy / Information privacy law / Information privacy / Health Insurance Portability and Accountability Act / Personally identifiable information / Internet privacy / Security breach notification laws / Privacy law / Law / Ethics

Memorandum To: LEO Workshop Members, Yale Law School From: Paul M. Schwartz, Jefferson E. Peyser Professor of Law, Berkeley Law School Re: “Information Privacy Federalism,” LEO Talk, Yale Law School (November 20, 201

Add to Reading List

Source URL: www.law.yale.edu

Language: English - Date: 2014-11-17 08:55:08
546Data security / Personally identifiable information / Data breach / Identity theft / Personal Data Privacy and Security Act / Security breach notification laws / Security / Computer security / Personal life

Kentucky League of Cities, Inc. Personally Identifiable Information Breach Notification Policy In an effort to protect individuals from the growing threat of identity theft caused by data breaches, if personally identifi

Add to Reading List

Source URL: www.klc.org

Language: English - Date: 2014-10-14 13:52:05
547Education in the United States / Cyberwarfare / Personal life / Personally identifiable information / Family Educational Rights and Privacy Act / Data breach / Charter school / Internet privacy / Government procurement in the United States / Security / Computer security / Data security

MODEL STUDENT DATA PRIVACY AND SECURITY POLICY Drafted by the Data Management Council and adopted by the Idaho State Board of Education Effective August 14, 2014 The efficient collection, analysis, and storage of student

Add to Reading List

Source URL: www.idahoartscharter.org

Language: English - Date: 2014-08-22 16:14:08
548Information sensitivity / Security breach notification laws / Information security / Personally identifiable information / Government procurement in the United States / Data breach / Personal Data Privacy and Security Act / SB / Security / Computer security / Data security

DATA BREACH CHARTS (Current as of October[removed]The charts below provide summary information about data breach notification statutes across the country. California adopted the first data breach notification statute in 20

Add to Reading List

Source URL: www.riddellwilliams.com

Language: English - Date: 2014-12-04 13:37:51
549Credit freeze / Equifax / Credit history / Credit card / TransUnion / Experian / Data breach / Fair and Accurate Credit Transactions Act / Annualcreditreport.com / Financial economics / Credit / Identity theft

SAFEGUARDING YOUR CHILD’S FUTURE Child Identity Theft Child identity theft happens when someone uses a minor’s personal information to commit fraud. A thief may steal and use a child’s information to get a job, gov

Add to Reading List

Source URL: bulkorder.ftc.gov

Language: English - Date: 2015-01-04 03:44:18
550Computer network security / Secure communication / National security / Password manager / Password / Identity theft / Credit card / Data breach / Internet privacy / Security / Computer security / Data security

This is the first issue of the SERENE-RISC digest, a quarterly publication from the SERENE-RISC Smart Cybersecurity Network. SERE NE-RI SC uses a multidisciplinar y approach to C ybersecurity Knowledge Mobilization by br

Add to Reading List

Source URL: www.serene-risc.ca

Language: English - Date: 2014-11-06 11:45:51
UPDATE